{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T03:25:30Z","timestamp":1778297130423,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540427339","type":"print"},{"value":"9783540454960","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_10","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T09:08:40Z","timestamp":1178356120000},"page":"126-141","source":"Crossref","is-referenced-by-count":35,"title":["A Reputation System to Increase MIX-Net Reliability"],"prefix":"10.1007","author":[{"given":"Roger","family":"Dingledine","sequence":"first","affiliation":[]},{"given":"Michael J.","family":"Freedman","sequence":"additional","affiliation":[]},{"given":"David","family":"Hopwood","sequence":"additional","affiliation":[]},{"given":"David","family":"Molnar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"10_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054144","volume-title":"Advances in Cryptology-EUROCRYPT 1998","author":"M. Abe","year":"1998","unstructured":"Masayuki Abe. Universally verifiable MIX with verification work independent of the number of MIX servers. In Advances in Cryptology-EUROCRYPT 1998, LNCS Vol. 1403. Springer-Verlag, 1998."},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1982.","DOI":"10.1145\/358549.358563"},{"key":"10_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-EUROCRYPT 2000","author":"Y. Desmedt","year":"2000","unstructured":"Yvo Desmedt and Kaoru Kurosawa. How to break a practical MIX and design a new one. In Advances in Cryptology-EUROCRYPT 2000, LNCS Vol. 1803. Springer-Verlag, 2000."},{"key":"10_CR4","unstructured":"Electronic Frontiers Georgia (EFGA). Anonymous remailer information. < http:\/\/anon.efga.org\/Remailers\/ >."},{"key":"10_CR5","unstructured":"C. Gulcu and G. Tsudik. Mixing E-mail with Babel. In Network and Distributed Security Symposium-NDSS\u2019 96. IEEE, 1996."},{"key":"10_CR6","unstructured":"J. Helsingius. anon.penet.fi press release. < http:\/\/www.penet.fi\/press-english.html >."},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Markus Jakobsson. Flash Mixing. In Principles of Distributed Computing-PODC\u2019 99. ACM, 1999.","DOI":"10.1145\/301308.301333"},{"key":"10_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_7","volume-title":"Information Hiding Workshop 1998","author":"D. Kesdogan","year":"1998","unstructured":"D. Kesdogan, M. Egner, and T. B\u00fcschkes. Stop-and-go MIXes providing probabilistic anonymity in an open system. In Information Hiding Workshop 1998, LNCS Vol. 1525. Springer Verlag, 1998."},{"key":"10_CR9","unstructured":"Raph Levien. Advogato\u2019s trust metric. < http:\/\/www.advogato.org\/trust-metric.html >."},{"key":"10_CR10","unstructured":"Tim May. Cyphernomicon. < http:\/\/www2.pro-ns.net\/crypto\/cyphernomicon.html >."},{"key":"10_CR11","unstructured":"Tim May. Description of early remailer history. E-mail archived at < http:\/\/www.inet-one.com\/cypherpunks\/dir.1996.08.29-1996.09.04\/msg00431.html >."},{"key":"10_CR12","unstructured":"Tim May. Description of Levien\u2019s pinging service. < http:\/\/www2.pro-ns.net\/crypto\/chapter8.html >."},{"key":"10_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_15","volume-title":"Advances in Cryptology-ASIACRYPT 2000","author":"M. Mitomo","year":"2000","unstructured":"M. Mitomo and K. Kurosawa. Attack for Flash MIX. In Advances in Cryptology-ASIACRYPT 2000, LNCS Vol. 1976. Springer-Verlag, 2000."},{"key":"10_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_14","volume-title":"Advances in Cryptology-ASIACRYPT 2000","author":"M. Ohkubo","year":"2000","unstructured":"M. Ohkubo and M. Abe. A Length-Invariant Hybrid MIX. In Advances in Cryptology-ASIACRYPT 2000, LNCS Vol. 1976. Springer-Verlag, 2000."},{"key":"10_CR15","unstructured":"R Process. Potato Software. < http:\/\/www.skuz.net\/potatoware\/ >."},{"key":"10_CR16","unstructured":"RProcess. Selective denial of service attacks. < http:\/\/www.eff.org\/pub\/Privacy\/Anonymity\/199909DoSremailvuln.html >."},{"key":"10_CR17","unstructured":"Zero Knowledge Systems. Freedom version 2 white papers. < http:\/\/www.freedom.net\/info\/whitepapers\/ >."}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T14:40:17Z","timestamp":1556376017000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_10","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}